Feeds

Boffin: Android's on-board malware scanner utterly FAILS

App blocker detects just 15% of malware

Secure remote control for conventional and virtual desktops

Google has added new anti-malware capabilities to Android 4.2 "Jelly Bean," but relying on them to block malicious apps might not be a good idea, says a computer science boffin from North Carolina State University.

The latest Android – currently only found on a select group of handsets – includes an on-device "application verification service" that claims to be able to alert users of potentially harmful apps and block their installation, irrespective of where they came from.

Associate professor Xuxian Jiang wanted to know how well the new feature fared against known Android malware, and to that end he pitted it against a collection of samples obtained by the university's Android Malware Genome Project.

The results? Not so good. Of the 1,260 samples tested, Android's on-device malware checker only managed to spot 193 of them, for a paltry detection rate of just 15.3 per cent.

That's bad news for Android users, as the instance of malware attacks on the platform has reportedly been growing – a point that Microsoft, in particular, has been using to flog its own, rival smartphone platform.

Jiang went on to pit the same sample collection against an assortment of ten Android-based antivirus engines. Without naming any of the products involved, Jiang reports that all of them fared significantly better than Jelly Bean's built-in one, with even the poorest performer catching 50 per cent of the malware.

Dialog box displayed by Android 4.2 when it spots potential malware

Even in Android 4.2 you won't be seeing this very often

Those are better findings than those reported in March by AV-Test, which reckoned that only about a third of the malware scanners for Android were actually up to the task.

Why such a poor showing for Google's product? According to Jiang, Jelly Bean's app verification service relies on relatively few data points to decide whether or not to block a given app install.

"Specifically, our study indicates that the app verification service mainly uses an app's SHA1 value and the package name to determine whether it is dangerous or potentially dangerous," he writes. "This mechanism is fragile and can be easily bypassed. It is already known that attackers can change with ease the checksums of existing malware (e.g., by repackaging or mutating it)."

Jiang further observes that Google has not integrated VirusTotal – a file-scanning security service which it bought in September – into the Android platform, but that VirusTotal performed significantly better than the app verification service in Jiang's tests.

Although Jiang notes that some form of malware checking more sophisticated than Jelly Bean's on-device method is necessary, however, he cautions that a delicate balance must be struck between security, device performance, and user privacy.

What's more, Jiang is quick to point out that the fact that Google is paying attention to Android security at all is welcome news. Prior to Android 4.2 – which is running on just 0.8 per cent of the devices out there, according to Google's stats – Android devices included no on-board security features at all.

Instead, they have relied on app stores to screen out malware, a method that researchers have shown doesn't always work. ®

New hybrid storage solutions

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.